会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 81. 发明申请
    • Authenticating suspect data using key tables
    • 使用关键表验证可疑数据
    • US20080162932A1
    • 2008-07-03
    • US11647932
    • 2006-12-29
    • David Carroll ChallenerJohn H. NicholsonJoseph Michael PennisiRod D. Waltermann
    • David Carroll ChallenerJohn H. NicholsonJoseph Michael PennisiRod D. Waltermann
    • H04L9/14
    • G06F21/57G06F21/51H04L9/0897H04L9/3236
    • A system and method for authenticating suspect code includes steps of: receiving the suspect code for a first instance of a trusted platform module; loading the suspect code into a trusted platform module device operatively associated with a processor, wherein the suspect code is loaded outside of a shielded location within the trusted platform module device; retrieving a validation public key from a table and storing it in a register in the trusted platform module device, the validation public key indexed by the suspect code; and retrieving a hash algorithm from the table, the hash algorithm indexed by the suspect code. The hash algorithm is run to derive a first hash value; then, using the validation public key, the second hash value is decrypted to derive a second decrypted hash value. The two hash values are compared; and upon determining a match, the suspect code is loaded into the shielded location of the processor for execution by the processor.
    • 用于认证可疑代码的系统和方法包括以下步骤:接收可信平台模块的第一实例的可疑代码; 将可疑代码加载到与处理器可操作地相关联的可信任的平台模块设备中,其中可疑代码被加载到可信平台模块设备内的屏蔽位置之外; 从表中检索验证公钥并将其存储在可信平台模块设备中的寄存器中,由可疑代码索引的验证公钥; 并从表中检索散列算法,由可疑代码索引的哈希算法。 运行散列算法以导出第一散列值; 然后,使用验证公钥,解密第二哈希值以导出第二解密哈希值。 比较两个哈希值; 并且在确定匹配时,可疑代码被加载到处理器的屏蔽位置以供处理器执行。
    • 82. 发明申请
    • Method and Apparatus for Providing Centralized User Authorization to Allow Secure Sign-On to a Computer System
    • 提供集中用户授权以允许安全登录到计算机系统的方法和装置
    • US20080148389A1
    • 2008-06-19
    • US11612092
    • 2006-12-18
    • Howard LockerDaryl CromerRandall S. SpringfieldRod D. Waltermann
    • Howard LockerDaryl CromerRandall S. SpringfieldRod D. Waltermann
    • G06F7/04
    • G06F21/575
    • A method for providing centralized user authorization to allow secure sign-on to a computer system is disclosed. In response to a user attempting to boot up a computer system, a message is sent to a trusted server by a hypervisor within the computer to request a new hard drive password for the computer system. If the user is not authorized to access the computer system, a packet is sent by the trusted server to instruct the hypervisor to stop any boot process on the computer system. If the user is authorized to access the computer system, a packet containing a partial hard drive password is sent by the trusted server to the computer system. The packet is then encrypted with a system public key by the computer system to yield the partial hard drive password. The computer system subsequently combines the partial hard drive password with a user password to generate a new complete hard drive password to continue with the boot process.
    • 公开了一种用于提供集中式用户授权以允许对计算机系统进行安全登录的方法。 响应于尝试启动计算机系统的用户,由计算机内的虚拟机管理程序向可信服务器发送消息,以请求计算机系统的新的硬盘驱动器密码。 如果用户没有权限访问计算机系统,则可信服务器发送一个数据包,以指示管理程序停止计算机系统上的任何引导过程。 如果用户被授权访问计算机系统,则包含部分硬盘驱动器密码的分组由可信服务器发送到计算机系统。 然后,计算机系统使用系统公钥对数据包进行加密,以产生部分硬盘驱动器密码。 计算机系统随后将部分硬盘驱动器密码与用户密码相结合,以生成新的完整硬盘驱动器密码,以继续引导过程。
    • 84. 发明申请
    • Method for controlling file access on computer systems
    • 控制计算机系统文件访问的方法
    • US20070283169A1
    • 2007-12-06
    • US11446737
    • 2006-06-05
    • Howard J. LockerDaryl C. CromerRandall S. SpringfieldRod D. Waltermann
    • Howard J. LockerDaryl C. CromerRandall S. SpringfieldRod D. Waltermann
    • H04L9/00G06F12/14H04L9/32G06F11/30
    • G06F12/1475G06F21/78
    • A method for controlling file access on computer systems is disclosed. Initially, a virtual machine manager (VMM) is provided in a computer system. In response to a write request, the VMM determines whether or not a location field is valid. If the location field is not valid, then the VMM writes the write request information to a storage device; but if the location field is valid, then the VMM encrypts the write request information before writing the write request information to the storage device. In response to a read request, the VMM again determines whether or not a location field is valid. If the location field is not valid, then the VMM sends the read request information to a read requester; but, if the location field is valid, then the VMM decrypts the read request information before sending the read request information to the read requester.
    • 公开了一种用于控制计算机系统上的文件访问的方法。 最初,在计算机系统中提供虚拟机管理器(VMM)。 响应于写入请求,VMM确定位置字段是否有效。 如果位置字段无效,则VMM将写请求信息写入存储设备; 但是如果位置字段有效,则VMM在将写入请求信息写入存储设备之前对写入请求信息进行加密。 响应于读取请求,VMM再次确定位置字段是否有效。 如果位置字段无效,则VMM将读取请求信息发送给读取请求者; 但是,如果位置字段有效,则VMM在将读取请求信息发送给读取请求者之前解密读取请求信息。
    • 85. 发明授权
    • File transfer applications
    • 文件传输应用程序
    • US09262042B2
    • 2016-02-16
    • US13189788
    • 2011-07-25
    • Karen R. KluttzJames A. HuntDavid RiveraRod D. Waltermann
    • Karen R. KluttzJames A. HuntDavid RiveraRod D. Waltermann
    • G06F3/0481G06F17/30
    • G06F3/0481G06F17/30126
    • Devices, methods and products are described that provide file transfer applications. One aspect provides a method including opening a file transfer application on an information handling device having an internal storage device; providing a source display area indicating a source storage device; providing a destination display area indicating a destination storage device; responsive to movement of one or more file icons a predetermined threshold amount beyond a boundary separating said source display area and said destination display area, change one or more indications to indicate to a user a destination storage device to which one or more files is to be transferred, said changing further comprising modifying screen brightness of the source display area; and responsive to movement of said one or more file icons a predetermined threshold amount beyond said boundary, transferring said one or more files to said destination storage device. Other embodiments are described.
    • 描述了提供文件传输应用的设备,方法和产品。 一方面提供一种方法,包括在具有内部存储装置的信息处理装置上打开文件传送应用程序; 提供指示源存储装置的源显示区域; 提供指示目的地存储装置的目的地显示区域; 响应于一个或多个文件图标的移动超过分隔所述源显示区域和所述目的地显示区域的边界的预定阈值量,改变一个或多个指示以向用户指示将要存在一个或多个文件的目的地存储设备 所述改变进一步包括改变所述源显示区域的屏幕亮度; 并且响应于所述一个或多个文件图标的移动超过所述边界的预定阈值量,将所述一个或多个文件传送到所述目的地存储设备。 描述其他实施例。